CVE-2021-47385
- EPSS 0.01%
- Veröffentlicht 21.05.2024 15:15:24
- Zuletzt bearbeitet 23.12.2024 21:01:31
In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field If driver read val value sufficient for (val & 0x08) && (!(val & 0x80)) && ((val & 0x7) == ((v...
CVE-2021-47386
- EPSS 0.01%
- Veröffentlicht 21.05.2024 15:15:24
- Zuletzt bearbeitet 02.04.2025 14:52:22
In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field If driver read val value sufficient for (val & 0x08) && (!(val & 0x80)) && ((val & 0x7) == ((v...
CVE-2021-47387
- EPSS 0.01%
- Veröffentlicht 21.05.2024 15:15:24
- Zuletzt bearbeitet 25.09.2025 15:38:17
In the Linux kernel, the following vulnerability has been resolved: cpufreq: schedutil: Use kobject release() method to free sugov_tunables The struct sugov_tunables is protected by the kobject, so we can't free it directly. Otherwise we would get ...
CVE-2021-47388
- EPSS 0.02%
- Veröffentlicht 21.05.2024 15:15:24
- Zuletzt bearbeitet 30.12.2024 20:05:07
In the Linux kernel, the following vulnerability has been resolved: mac80211: fix use-after-free in CCMP/GCMP RX When PN checking is done in mac80211, for fragmentation we need to copy the PN to the RX struct so we can later use it to do a comparis...
CVE-2021-47389
- EPSS 0.02%
- Veröffentlicht 21.05.2024 15:15:24
- Zuletzt bearbeitet 02.04.2025 14:52:16
In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: fix missing sev_decommission in sev_receive_start DECOMMISSION the current SEV context if binding an ASID fails after RECEIVE_START. Per AMD's SEV API, RECEIVE_START gen...
CVE-2021-47390
- EPSS 0.02%
- Veröffentlicht 21.05.2024 15:15:24
- Zuletzt bearbeitet 30.12.2024 20:01:12
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect() KASAN reports the following issue: BUG: KASAN: stack-out-of-bounds in kvm_make_vcpus_request_mask+0x1...
CVE-2021-47391
- EPSS 0.01%
- Veröffentlicht 21.05.2024 15:15:24
- Zuletzt bearbeitet 23.09.2025 20:16:11
In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests The FSM can run in a circle allowing rdma_resolve_ip() to be called twice on the same id_priv. While this c...
CVE-2021-47392
- EPSS 0.02%
- Veröffentlicht 21.05.2024 15:15:24
- Zuletzt bearbeitet 23.09.2025 20:16:25
In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure If cma_listen_on_all() fails it leaves the per-device ID still on the listen_list but the state is not set to RDMA_C...
CVE-2021-47393
- EPSS 0.03%
- Veröffentlicht 21.05.2024 15:15:24
- Zuletzt bearbeitet 23.09.2025 20:17:04
In the Linux kernel, the following vulnerability has been resolved: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs Fan speed minimum can be enforced from sysfs. For example, setting current fan speed to 20 i...
CVE-2021-47394
- EPSS 0.02%
- Veröffentlicht 21.05.2024 15:15:24
- Zuletzt bearbeitet 03.02.2025 16:11:30
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: unlink table before deleting it syzbot reports following UAF: BUG: KASAN: use-after-free in memcmp+0x18f/0x1c0 lib/string.c:955 nla_strcmp+0xf2/0x130 lib/nla...